Cybersecurity Glossary
Security terms explained two ways — simple analogies anyone can understand, and precise technical definitions for professionals.
52 terms and growing
What is API Security Testing?
Think of your computer system like a castle with many doors and windows. These doors and windows are like APIs—they let information in an...
What is Attack Surface?
Think of your computer system like a house. The attack surface is all the places someone could sneak in, like doors, windows, or the chim...
What is Authentication Bypass?
Think of your house with a special lock that only opens with a unique key. Now, imagine someone sneaks in through a window you forgot to ...
What is Broken Access Control?
Think of your digital world like a house with different rooms, each meant for specific people. You wouldn't want just anyone to walk into...
What is Bug Bounty Program?
Think of your house as a big castle, and you want to make sure it's safe from sneaky intruders. Instead of checking every corner yourself...
What is Clickjacking?
Think about playing a game at a carnival where you throw a ball to hit a target and win a prize. But the game is rigged with an invisible...
What is Command Injection?
Imagine your computer is like a restaurant, and each task it performs is a chef preparing a dish. You normally place your order by tellin...
What is Container Security?
Think of your computer as a big apartment building. Each software program is like its own apartment. Container security is about making s...
What is Content Security Policy?
Think of your web browser like a house with many doors and windows. You want to let in only trusted friends, not strangers who might caus...
What is CORS Misconfiguration?
Think of the internet like a neighborhood where each website is a house with its own mailbox. Normally, only the people living in a house...
What is Cross-Site Request Forgery?
Think of your web browser like a magic mailbox that sends messages for you when you think about them. Now, imagine someone sneaks a fake ...
What is Cryptographic Failures?
Think of your diary with a lock that anyone can open with a hairpin. That's like using weak encryption methods, such as MD5 or SHA1, whic...
What is CVSS Score?
Think of the CVSS Score like a safety rating for software. Imagine you're checking how secure different houses are. Some have strong lock...
What is DDoS Attack?
Imagine you're throwing a birthday party and you've invited a few friends. Suddenly, hundreds of strangers show up at your door, all dema...
What is Directory Traversal?
Think of your computer system like a large hotel, with each room representing a different folder. You have a key to your room, but not to...
What is DNS Reconnaissance?
Think of the internet like a big neighborhood, where each website is a house with a unique address. DNS reconnaissance is like being a cu...
What is IDOR (Insecure Direct Object Reference) Detection?
Think of your neighborhood where each house has a mailbox with a number. Ideally, you only open your own mailbox. But imagine if you trie...
What is Incident Response?
Think of your computer systems like a castle. You have walls, guards, and watchtowers to keep it safe. One day, you find someone has snuc...
What is OAuth Vulnerabilities?
Think of OAuth like a digital key system for your online accounts. You give temporary keys to apps so they can access your stuff without ...
What is OWASP Top 10?
Think of your website like a big, important house. Each room in this house is a part of your website that you want to keep safe—like your...
What is Password Hashing?
Think of your password like a secret recipe for your favorite dessert. You don't want anyone to know the exact recipe, so you mix it up i...
What is Penetration Testing?
Think of your computer system like a castle. You hire a friendly 'pretend intruder' to try and break in by sneaking through windows or pi...
What is Phishing?
Imagine a fisherman casting a line into a pond, hoping to catch fish with a shiny, fake worm. In the digital world, phishing is similar. ...
What is Port Scanning?
Imagine your house has many doors and windows, each leading to different rooms. Port scanning is like a friendly neighbor walking around ...
What is Privilege Escalation?
Think of a big building with many floors. You have a key that only lets you into the lobby, but you want to reach the fancy penthouse on ...
What is Ransomware?
Think of your computer like your favorite toy box. One day, someone sneaks in and changes the lock so you can't open it anymore. They lea...
What is Reflected XSS?
Imagine you're playing a game where you tell a joke to a talking parrot. The parrot repeats exactly what you say. Now, think of a prankst...
What is Remote Code Execution?
Imagine your computer is like a locked house. You have the keys, so only you can decide who enters and what happens inside. Remote Code E...
What is Reverse Shell?
Think of your computer as a house. Normally, if you want to talk to someone outside, you open your front door and call them. That's like ...
What is Security Audit?
Think of your digital world like a castle. A security audit is like inviting a very observant friend to walk around, checking every gate,...
What is Security Misconfiguration?
Think of your computer system like a house filled with treasures you want to keep safe. Security misconfiguration is like leaving your fr...
What is Sensitive Data Exposure?
Imagine your house is full of valuable things like jewelry and important papers. You keep them safe by locking your doors and windows. Bu...
What is Server-Side Request Forgery?
Imagine your friend is at a party (the server) and you want to see inside some rooms (internal resources) without being invited. If you c...
What is Social Engineering?
Think of your secret clubhouse that only lets people in with a special password. Now, imagine if someone wants to get in, but instead of ...
What is SQL Injection?
Imagine you're at a magic show, and the magician lets you pick a card from a deck. Normally, you'd just choose one card, right? But what ...
What is Stored XSS?
Think of a community bulletin board where people put up notes. Now, imagine someone sneaks in and posts a note with invisible ink that tu...
What is Subdomain Enumeration?
Think of a website like a big house. Everyone sees the front door, but there are also side doors and back doors that aren't as obvious. S...
What is Supply Chain Attack?
Think about building a treehouse using materials from different stores. You expect the wood, nails, and tools to be safe and reliable. Bu...
What is Threat Modeling?
Think of your computer system like a big, fancy house with lots of doors and windows. Each door or window is a way someone could sneak in...
What is TLS Misconfiguration?
Imagine your internet connection as a secure mail delivery. You have a special lock on your mailbox that only you and trusted mail carrie...
What is Two-Factor Authentication?
Imagine your house has a front door with a lock. To get in, you need a key. But what if there was another layer of security, like a secre...
What are Security Headers?
Think of your website as a house. Security headers are like different locks and rules you put on the doors and windows to keep unwanted g...
What is Web Application Firewall?
Think of a Web Application Firewall, or WAF, like a security guard at a concert. This guard checks everyone's bags at the entrance, makin...
What is Zero Trust Architecture?
Think of your computer network like a big house filled with rooms. Just because someone is inside the house doesn't mean they're allowed ...
What is Zero-Day Vulnerability?
Think of your computer as a house. Now, imagine there's a secret door in your house that even you don't know about. One day, someone find...